[ale] Update your systems *NOW*...

Michael B. Trausch mike at trausch.us
Wed Jan 28 16:06:00 EST 2015


... if you have not done so very recently.

There is an arbitrary code execution vulnerability in glibc, which is at
the core of all systems, which was fixed in late 2013, but not
identified as a vulnerability until recently.

https://access.redhat.com/articles/1332213

Red Hat and CentOS are patched; but it is notable as noted in the
document link above: *All versions of glibc shipped with all variants of
Red Hat Enterprise Linux are affected.

*You can verify your system is patched by running the utility the source
of which appears here:

http://www.openwall.com/lists/oss-security/2015/01/27/9

If your system is patched, it will report "not vulnerable":

[mbt at pbx ~]$ ./ghost
vulnerable
[mbt at pbx ~]$ sudo yum update -y
[... OUTPUT TRIMMED ...]
[mbt at pbx ~]$ ./ghost
not vulnerable

Don't forget to restart daemon processes so that they get the new C
library, or running processes will continue to be vulnerable after the
update.  To reload init, you must reboot the system.

    — Mike
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://mail.ale.org/pipermail/ale/attachments/20150128/fd11bc6d/attachment.html>


More information about the Ale mailing list